062. A Few Ways to Detect a Dumping Tool from a Ransomware Gang's Toolset

Hello everyone! Today we'll look at another tool from a ransomware gang's toolkit. It's called MiniDump, and it enables adversaries to dump LSASS or any other process.


Let's look at a few detection opportunities. The tool drops and loads a driver with the following name  - kxxxxxxx.sys. It means we can search for creation events related to it:

event_type: "filecreate" 

AND 

file_name: "kxxxxxxx.sys"

MiniDump also creates a service with the same name - another detection opportunity:

event_type: "serviceuninstallwin"

AND

service_name: "kxxxxxxx.sys"

Finally, the tool loads the driver:

event_type: "driverloadwin" 

AND

file_name: "kxxxxxxx.sys"

AND

file_sig: "DFOCUS Co., Ltd"

Interesting enough that the driver name is the same as in the EDR killer advertised some time ago by threat actor with moniker "r1z".

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

001. The Zeltser Challenge

012. They Want to Know Everything About Your System!